Feeds

DDoSers bombard Military root server (and more)

Flooded for 12 hours

Secure remote control for conventional and virtual desktops

At least three DNS root servers, including one maintained by the US Department of Defense, were flooded with data for about 12 hours in an attack that was notable more for its audacity than any noticeable degradation of internet traffic.

The DOD's G server was among those sustaining the most damage, according to an analysis of the machine's unanswered queries. The L server, maintained by ICANN, and the WIDE Project's M server, located in multiple locations, were also hit in attacks that started a little after midnight GMT on Tuesday.

There were reports that F and I servers also faced increased traffic, but those attacks appeared to be short-lived. They appeared to affect certain top-level-domains, including .org.

SANS said it was aware of root server attacks but is still wading through data before issuing a report. It encouraged people with logs, or other information relating to the attacks to send it to SANS officials.

It was unclear where the attacks originated, since the perpetrators disguised the origination of the packet flood, according to the Associated Press. There was some speculation they may have come out of Korea.

There were few reports of widespread outages, which comes as little surprise since the group of 13 root servers, which is then broken up into dozens more smaller, geographically dispersed servers, were designed so that two-thirds can fail with no noticeable interruption. Whois and other services provided by ICANN were down for a time, according to a post on a discussion group.

Despite the inefficacy of the attack, federal authorities, especially those in the military, never take kindly to attacks on their infrastructure. We envision a lot of sleepless nights for government spooks until the perpetrators are caught. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.